Chromium Code Reviews| Index: chrome/browser/chromeos/platform_keys/platform_keys_service_factory.cc |
| diff --git a/chrome/browser/chromeos/platform_keys/platform_keys_service_factory.cc b/chrome/browser/chromeos/platform_keys/platform_keys_service_factory.cc |
| index 8394c2f38f3cb6b15587ac8798775389760d9eed..e8dd230614000257d30d7aadd738be494f90c6f0 100644 |
| --- a/chrome/browser/chromeos/platform_keys/platform_keys_service_factory.cc |
| +++ b/chrome/browser/chromeos/platform_keys/platform_keys_service_factory.cc |
| @@ -4,14 +4,65 @@ |
| #include "chrome/browser/chromeos/platform_keys/platform_keys_service_factory.h" |
| +#include "base/bind.h" |
| #include "base/logging.h" |
| #include "base/memory/singleton.h" |
| +#include "base/memory/weak_ptr.h" |
| #include "chrome/browser/chromeos/platform_keys/platform_keys_service.h" |
| #include "chrome/browser/extensions/extension_system_factory.h" |
| +#include "chrome/browser/policy/profile_policy_connector.h" |
| +#include "chrome/browser/policy/profile_policy_connector_factory.h" |
| #include "chrome/browser/profiles/incognito_helpers.h" |
| +#include "chrome/browser/ui/platform_keys_certificate_selector_chromeos.h" |
| #include "components/keyed_service/content/browser_context_dependency_manager.h" |
| +#include "extensions/browser/extension_registry.h" |
| namespace chromeos { |
| +namespace { |
| + |
| +// This delegate selects a certificate by showing the certificate selection |
| +// dialog to the user. |
| +class DefaultSelectDelegate |
| + : public chromeos::PlatformKeysService::SelectDelegate { |
| + public: |
| + // If |enabled| is false, this delegate always selects no certificate. |
| + explicit DefaultSelectDelegate(bool enabled) |
| + : enabled_(enabled), weak_factory_(this) {} |
| + ~DefaultSelectDelegate() override {} |
| + |
| + void Select(const std::string& extension_id, |
| + const net::CertificateList& certs, |
| + const CertificateSelectedCallback& callback, |
| + content::WebContents* web_contents, |
| + content::BrowserContext* context) override { |
| + if (!enabled_) { |
|
msw
2015/02/19 20:21:54
Consider defining a separate no-op SelectDelegate
pneubeck (no reviews)
2015/02/19 21:51:41
Done.
|
| + callback.Run(nullptr); |
| + return; |
| + } |
| + CHECK(web_contents); |
| + const extensions::Extension* extension = |
|
bartfab (slow)
2015/02/19 18:55:42
Nit 1: s/const extensions::Extension*/const extens
pneubeck (no reviews)
2015/02/19 21:51:41
Done.
|
| + extensions::ExtensionRegistry::Get(context)->GetExtensionById( |
| + extension_id, extensions::ExtensionRegistry::ENABLED); |
|
bartfab (slow)
2015/02/19 18:55:42
What if the extension is not found? At least a DCH
pneubeck (no reviews)
2015/02/19 21:51:41
Done.
|
| + ShowPlatformKeysCertificateSelector( |
| + web_contents, extension->short_name(), certs, |
| + // Don't call |callback| once this delegate is destructed, thus use a |
| + // WeakPtr. |
| + base::Bind(&DefaultSelectDelegate::SelectedCertificate, |
| + weak_factory_.GetWeakPtr(), callback)); |
| + } |
| + |
| + void SelectedCertificate( |
| + const CertificateSelectedCallback& callback, |
| + const scoped_refptr<net::X509Certificate>& selected_cert) { |
|
bartfab (slow)
2015/02/19 18:55:42
Nit 1: #include "base/memory/ref_counted.h"
Nit 2:
pneubeck (no reviews)
2015/02/19 21:51:41
Done.
|
| + callback.Run(selected_cert); |
|
msw
2015/02/19 20:21:54
Shouldn't this DCHECK(enabled_) or ensure that |se
pneubeck (no reviews)
2015/02/19 21:51:41
not required anymore.
|
| + } |
| + |
| + private: |
| + const bool enabled_; |
| + base::WeakPtrFactory<DefaultSelectDelegate> weak_factory_; |
| +}; |
|
bartfab (slow)
2015/02/19 18:55:42
Nit: DISALLOW_COPY_AND_ASSIGN.
pneubeck (no reviews)
2015/02/19 21:51:41
Done.
|
| + |
| +} // namespace |
| // static |
| PlatformKeysService* PlatformKeysServiceFactory::GetForBrowserContext( |
| @@ -45,7 +96,17 @@ KeyedService* PlatformKeysServiceFactory::BuildServiceInstanceFor( |
| extensions::StateStore* store = |
| extensions::ExtensionSystem::Get(context)->state_store(); |
| DCHECK(store); |
| - return new PlatformKeysService(context, store); |
| + PlatformKeysService* service = new PlatformKeysService(context, store); |
| + |
| + policy::ProfilePolicyConnector* connector = |
|
bartfab (slow)
2015/02/19 18:55:42
Nit: const.
pneubeck (no reviews)
2015/02/19 21:51:41
Done.
|
| + policy::ProfilePolicyConnectorFactory::GetForBrowserContext(context); |
| + // Only allow the user to grant certificate permissions to extensions, if user |
|
bartfab (slow)
2015/02/19 18:55:42
Nit: s/, if/if the/
pneubeck (no reviews)
2015/02/19 21:51:40
Done.
|
| + // is not managed by policy. Otherwise the user might leak access to (private |
| + // keys of) certificates against the intentions of the administrator. |
| + // TODO(pneubeck): Remove this once the respective policy is implemented. |
|
bartfab (slow)
2015/02/19 18:55:42
Nit: Reference a crbug number.
pneubeck (no reviews)
2015/02/19 21:51:40
Done.
|
| + service->SetSelectDelegate(make_scoped_ptr( |
|
bartfab (slow)
2015/02/19 18:55:42
Nit: #include "base/memory/scoped_ptr.h"
pneubeck (no reviews)
2015/02/19 21:51:40
Done.
|
| + new DefaultSelectDelegate(!connector->IsManaged() /* enabled */))); |
| + return service; |
| } |
| } // namespace chromeos |